首页 > 最新文献

2012 International Conference on Communications and Information Technology (ICCIT)最新文献

英文 中文
Cunetsim: A GPU based simulation testbed for large scale mobile networks Cunetsim:基于GPU的大规模移动网络仿真测试平台
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285829
B. Bilel, Nikaein Navid
Most of the existing packet-level simulation tools are designed to perform experiments modeling small to medium scale networks. The main reason of this limitation is the amount of available computation power and memory in CPU-based simulation environments. To enable efficient packet-level simulation for large scale scenarios, we introduce a CPU-GPU co-simulation framework where synchronization and experiment design are performed in CPU and node's logical processes are executed in parallel in GPU according to the master/worker model. The framework is developed using the Compute-Unified Device Architecture (CUDA) API and denoted as Cunetsim, CUDA network simulator. In this work, we study the node mobility and connectivity as they are among the most time consuming task when large scale networks are simulated. Simulation results show that Cunetsim runtime remains stable and that it achieves significantly lower runtime than existing approaches when computing mobility and connectivity with no degradation in the accuracy of the results. Further, the connectivity is achieved up to 870 times faster than Sinalgo, which presents the best performances know until now.
大多数现有的包级仿真工具都是设计用来对中小型网络进行实验建模的。这种限制的主要原因是基于cpu的模拟环境中可用的计算能力和内存的数量。为了在大规模场景中实现高效的分组级仿真,我们引入了一个CPU-GPU协同仿真框架,其中同步和实验设计在CPU中执行,节点的逻辑进程根据主/工作模型在GPU中并行执行。该框架使用计算统一设备架构(CUDA) API开发,并标记为Cunetsim, CUDA网络模拟器。在这项工作中,我们研究了节点的移动性和连通性,因为它们是模拟大规模网络时最耗时的任务之一。仿真结果表明,Cunetsim的运行时间保持稳定,在计算移动性和连通性时,其运行时间明显低于现有方法,且结果的准确性没有下降。此外,连接速度比Sinalgo快870倍,这是迄今为止所知的最佳性能。
{"title":"Cunetsim: A GPU based simulation testbed for large scale mobile networks","authors":"B. Bilel, Nikaein Navid","doi":"10.1109/ICCITECHNOL.2012.6285829","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285829","url":null,"abstract":"Most of the existing packet-level simulation tools are designed to perform experiments modeling small to medium scale networks. The main reason of this limitation is the amount of available computation power and memory in CPU-based simulation environments. To enable efficient packet-level simulation for large scale scenarios, we introduce a CPU-GPU co-simulation framework where synchronization and experiment design are performed in CPU and node's logical processes are executed in parallel in GPU according to the master/worker model. The framework is developed using the Compute-Unified Device Architecture (CUDA) API and denoted as Cunetsim, CUDA network simulator. In this work, we study the node mobility and connectivity as they are among the most time consuming task when large scale networks are simulated. Simulation results show that Cunetsim runtime remains stable and that it achieves significantly lower runtime than existing approaches when computing mobility and connectivity with no degradation in the accuracy of the results. Further, the connectivity is achieved up to 870 times faster than Sinalgo, which presents the best performances know until now.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126623383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
New multi access selection method using differentiated weight of access interface 基于差分接入接口权重的多址选择新方法
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285799
M. Lahby, L. Cherkaoui, A. Adib
The fourth generation (4G) of wireless communications are growing rapidly and are integrating a multitude of radio access technologies (RAT'S). The most important issue of the mobile terminal which is equipped with multiple interfaces is how to select dynamically the best access network in terms of quality of service. To cope with this issue we propose a new technique for network selection decision. This technique combines two multi attribute decision making (MADM) methods such as analytic network process (ANP) to find the differentiate weights of available networks by considering each criterion, and the grey relational analysis (GRA) method to rank the alternatives. To show the effectiveness of our technique we present the simulation results of two traffic classes namely background and streaming.
第四代无线通信(4G)正在迅速发展,并集成了多种无线接入技术(RAT)。在多接口的移动终端中,如何动态选择服务质量最佳的接入网是一个非常重要的问题。为了解决这一问题,我们提出了一种新的网络选择决策技术。该技术结合了两种多属性决策方法,即分析网络过程(ANP)和灰色关联分析(GRA)方法,前者通过考虑各准则来寻找可用网络的差分权值,后者通过灰色关联分析(GRA)方法对备选方案进行排序。为了证明该技术的有效性,我们给出了背景和流两类流量的仿真结果。
{"title":"New multi access selection method using differentiated weight of access interface","authors":"M. Lahby, L. Cherkaoui, A. Adib","doi":"10.1109/ICCITECHNOL.2012.6285799","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285799","url":null,"abstract":"The fourth generation (4G) of wireless communications are growing rapidly and are integrating a multitude of radio access technologies (RAT'S). The most important issue of the mobile terminal which is equipped with multiple interfaces is how to select dynamically the best access network in terms of quality of service. To cope with this issue we propose a new technique for network selection decision. This technique combines two multi attribute decision making (MADM) methods such as analytic network process (ANP) to find the differentiate weights of available networks by considering each criterion, and the grey relational analysis (GRA) method to rank the alternatives. To show the effectiveness of our technique we present the simulation results of two traffic classes namely background and streaming.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122470723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A variational component splitting approach for finite generalized Dirichlet mixture models 有限广义Dirichlet混合模型的变分分量分裂方法
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285806
Wentao Fan, N. Bouguila
In this paper, a component splitting and local model selection method is proposed to address the mission of learning and selecting generalized Dirichlet (GD) mixture model with feature selection in an incremental variational way. Under the proposed principled variational framework, we simultaneously estimate, in a closed-form, all the involved parameters and determine the complexity (i.e. both model and features selection) of the GD mixture. The effectiveness of the proposed approach is evaluated using synthetic data as well as real a challenging application involving image categorization.
针对以增量变分方式学习和选择具有特征选择的广义Dirichlet (GD)混合模型的问题,提出了一种成分分割和局部模型选择方法。在提出的原则变分框架下,我们同时以封闭形式估计所有涉及的参数,并确定GD混合物的复杂性(即模型和特征选择)。利用合成数据以及涉及图像分类的具有挑战性的实际应用来评估所提出方法的有效性。
{"title":"A variational component splitting approach for finite generalized Dirichlet mixture models","authors":"Wentao Fan, N. Bouguila","doi":"10.1109/ICCITECHNOL.2012.6285806","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285806","url":null,"abstract":"In this paper, a component splitting and local model selection method is proposed to address the mission of learning and selecting generalized Dirichlet (GD) mixture model with feature selection in an incremental variational way. Under the proposed principled variational framework, we simultaneously estimate, in a closed-form, all the involved parameters and determine the complexity (i.e. both model and features selection) of the GD mixture. The effectiveness of the proposed approach is evaluated using synthetic data as well as real a challenging application involving image categorization.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Flower image segmentation based on color analysis and a supervised evaluation 基于颜色分析和监督评价的花卉图像分割
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285834
A. Najjar, E. Zagrouba
We propose a flower segmentation schema which overcomes some limits of previous works. Indeed, it does not involve any interaction with the user, or make assumptions based on the domain knowledge. To achieve segmentation, we used OTSU thresholding on Lab color space. The thresholding was performed, separately, on the three component L, a and b, and the best result is selected relatively to the ground truth. The experimentation of the proposed method, performed using the dataset from the Oxford flower collection, make better the results, while consuming less CPU time, than the method proposed by Nilsback and Zisserman[5].
我们提出了一种花分割模式,克服了以往研究的一些局限性。实际上,它不涉及与用户的任何交互,也不基于领域知识做出假设。为了实现分割,我们在Lab色彩空间上使用了OTSU阈值。分别对L、a、b三个分量进行阈值分割,相对于ground truth选择最佳结果。使用牛津花收集的数据集进行的实验表明,与Nilsback和Zisserman[5]提出的方法相比,该方法在消耗更少CPU时间的同时取得了更好的结果。
{"title":"Flower image segmentation based on color analysis and a supervised evaluation","authors":"A. Najjar, E. Zagrouba","doi":"10.1109/ICCITECHNOL.2012.6285834","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285834","url":null,"abstract":"We propose a flower segmentation schema which overcomes some limits of previous works. Indeed, it does not involve any interaction with the user, or make assumptions based on the domain knowledge. To achieve segmentation, we used OTSU thresholding on Lab color space. The thresholding was performed, separately, on the three component L, a and b, and the best result is selected relatively to the ground truth. The experimentation of the proposed method, performed using the dataset from the Oxford flower collection, make better the results, while consuming less CPU time, than the method proposed by Nilsback and Zisserman[5].","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Performance analysis of DS-OCDMA using novel multi-level periodic codes 基于新型多级周期码的DS-OCDMA性能分析
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285784
Besma Hammami, H. Fathallah, H. Rezig
In this paper we present a theoretical simulation that evaluate the performance of direct-sequence optical code-division multiple-access (DS-OCDMA) system, using a novel periodic optical encoder applied to fiber-to-the-X (FTTX) passive optical network (PONs). We investigate the performances in terms of signal to noise ratio (SNR) and bit error rate (BER) in the presence of multiple access interference (MAI) and an additive white Gaussian noise (AWGN). Three groups of parameters were considered in this work: the number of users, the parameters related to the encoder and the parameters of the receiver.
在本文中,我们提出了一个理论模拟来评估直接顺序光码分多址(DS-OCDMA)系统的性能,使用一种新型的周期光编码器应用于光纤到x (FTTX)无源光网络(pon)。我们研究了在存在多址干扰(MAI)和加性高斯白噪声(AWGN)时的信噪比(SNR)和误码率(BER)的性能。在这项工作中考虑了三组参数:用户数量、与编码器相关的参数和接收机的参数。
{"title":"Performance analysis of DS-OCDMA using novel multi-level periodic codes","authors":"Besma Hammami, H. Fathallah, H. Rezig","doi":"10.1109/ICCITECHNOL.2012.6285784","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285784","url":null,"abstract":"In this paper we present a theoretical simulation that evaluate the performance of direct-sequence optical code-division multiple-access (DS-OCDMA) system, using a novel periodic optical encoder applied to fiber-to-the-X (FTTX) passive optical network (PONs). We investigate the performances in terms of signal to noise ratio (SNR) and bit error rate (BER) in the presence of multiple access interference (MAI) and an additive white Gaussian noise (AWGN). Three groups of parameters were considered in this work: the number of users, the parameters related to the encoder and the parameters of the receiver.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133363096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliable broadcasting in VANETs using Physical-Layer Network Coding 利用物理层网络编码实现vanet的可靠广播
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285827
E. D. N. Ndih, S. Cherkaoui
In this paper, we present a PNC-based MAC protocol for VANETs (VPNC-MAC) which makes use of the PNC to ensure efficiency and reliability of periodic beacon transmissions in VANETs. The VPNC-MAC protocol basically consists on two phases: a setup phase and the heartbeat packet exchange phase. During the setup stage, VPNC-MAC uses a location-based OFDMA signaling technique to guarantee a quick and non bandwidth consuming setup. In addition, the packet exchange phase in VPNC-MAC contains two periods of variable and adjustable length. The fist period is a guaranteed time slot period, called the VPNC-MAC session, in which the nodes exchange their packets using PNC. The second period is a contention period reserved to nodes unable to transmit during the VPNC-MAC session. The simulation results shows that the VPNC-MAC protocol outperforms the optimal CSMA (ideal TDMA) in terms of capacity of transmissions supported within a fixed duration, and overall packet reception rate.
本文提出了一种基于PNC的vanet MAC协议(VPNC-MAC),该协议利用PNC来保证vanet中周期性信标传输的效率和可靠性。vpn - mac协议基本上分为两个阶段:建立阶段和心跳报文交换阶段。在设置阶段,VPNC-MAC使用基于位置的OFDMA信令技术来保证快速且不消耗带宽的设置。此外,VPNC-MAC的报文交换阶段包含可变长度和可调长度两个周期。第一个时间段是一个保证的时隙时间段,称为VPNC-MAC会话,节点之间使用PNC交换报文。第二个时间段是为VPNC-MAC会话中无法传输的节点保留的竞争时间段。仿真结果表明,VPNC-MAC协议在固定持续时间内支持的传输容量和总体数据包接收速率方面都优于理想TDMA协议。
{"title":"Reliable broadcasting in VANETs using Physical-Layer Network Coding","authors":"E. D. N. Ndih, S. Cherkaoui","doi":"10.1109/ICCITECHNOL.2012.6285827","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285827","url":null,"abstract":"In this paper, we present a PNC-based MAC protocol for VANETs (VPNC-MAC) which makes use of the PNC to ensure efficiency and reliability of periodic beacon transmissions in VANETs. The VPNC-MAC protocol basically consists on two phases: a setup phase and the heartbeat packet exchange phase. During the setup stage, VPNC-MAC uses a location-based OFDMA signaling technique to guarantee a quick and non bandwidth consuming setup. In addition, the packet exchange phase in VPNC-MAC contains two periods of variable and adjustable length. The fist period is a guaranteed time slot period, called the VPNC-MAC session, in which the nodes exchange their packets using PNC. The second period is a contention period reserved to nodes unable to transmit during the VPNC-MAC session. The simulation results shows that the VPNC-MAC protocol outperforms the optimal CSMA (ideal TDMA) in terms of capacity of transmissions supported within a fixed duration, and overall packet reception rate.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hierarchical modeling of redundancy and paths in wireless sensor networks 无线传感器网络中冗余和路径的分层建模
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285800
Chérifa Boucetta, H. Idoudi, L. Saïdane
The main goal of wireless sensor networks is to monitor a target field and transmit surveillance data to a sink. Therefore, connectivity of the sensor network and full coverage of the monitored area are the most relevant concerns to reach these goals. In order to maintain the connectivity, we propose in this paper an hierarchical model for the wireless sensor networks deployment which consists of dividing sensors in sets of equivalent nodes. We study the effectiveness of the model under different deployment strategies: random, circular and Poisson point process distributions. We investigate the impact of deployment strategies on (i) coverage (ii) connectivity ratio and (iii) the shortest path to sink.
无线传感器网络的主要目标是监测目标场并将监测数据传输到接收器。因此,传感器网络的连通性和监测区域的全覆盖是实现这些目标最相关的问题。为了保持无线传感器网络的连通性,本文提出了一种分层的无线传感器网络部署模型,该模型将传感器划分为等效节点集。我们研究了该模型在不同部署策略下的有效性:随机、圆形和泊松点过程分布。我们研究了部署策略对(i)覆盖率(ii)连通性比率和(iii) sink的最短路径的影响。
{"title":"Hierarchical modeling of redundancy and paths in wireless sensor networks","authors":"Chérifa Boucetta, H. Idoudi, L. Saïdane","doi":"10.1109/ICCITECHNOL.2012.6285800","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285800","url":null,"abstract":"The main goal of wireless sensor networks is to monitor a target field and transmit surveillance data to a sink. Therefore, connectivity of the sensor network and full coverage of the monitored area are the most relevant concerns to reach these goals. In order to maintain the connectivity, we propose in this paper an hierarchical model for the wireless sensor networks deployment which consists of dividing sensors in sets of equivalent nodes. We study the effectiveness of the model under different deployment strategies: random, circular and Poisson point process distributions. We investigate the impact of deployment strategies on (i) coverage (ii) connectivity ratio and (iii) the shortest path to sink.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A trust model for a multi-agent negotiation 多智能体协商的信任模型
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285811
H. Klabi, K. Mellouli, Sehl Mellouli, Monia Rekik
The purpose of this research is to integrate the trust dimension in the negotiation process. Based on an extensive literature review, we address a combinatory formula that computes trust towards a target agent in a negotiation. This formula includes three elements which are the direct reputation of the target agent, the indirect reputation of the target agent, and the difference of beliefs between the two negotiating agents. These elements are computed through five parameters: the negotiation field, the arrangement weight, the arrangement time, the reliability degree, and the importance degree of the target negotiating agent. The proposed model is applied in the case study of a combinatorial auction between one shipper and a set of carriers. Results show that, compared to bid prices and reputation models, our model lead lower costs in determining the winning carriers.
本研究的目的在于整合协商过程中的信任维度。基于广泛的文献回顾,我们提出了一个计算谈判中目标代理信任的组合公式。该公式包括三个要素,即目标代理人的直接声誉,目标代理人的间接声誉,以及两个谈判代理人之间的信念差异。这些要素通过谈判领域、安排权重、安排时间、可靠度和目标谈判代理的重要度五个参数来计算。将该模型应用于一个托运人和一组承运人之间的组合拍卖案例研究。结果表明,与投标价格和声誉模型相比,我们的模型在确定获胜运营商方面的成本更低。
{"title":"A trust model for a multi-agent negotiation","authors":"H. Klabi, K. Mellouli, Sehl Mellouli, Monia Rekik","doi":"10.1109/ICCITECHNOL.2012.6285811","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285811","url":null,"abstract":"The purpose of this research is to integrate the trust dimension in the negotiation process. Based on an extensive literature review, we address a combinatory formula that computes trust towards a target agent in a negotiation. This formula includes three elements which are the direct reputation of the target agent, the indirect reputation of the target agent, and the difference of beliefs between the two negotiating agents. These elements are computed through five parameters: the negotiation field, the arrangement weight, the arrangement time, the reliability degree, and the importance degree of the target negotiating agent. The proposed model is applied in the case study of a combinatorial auction between one shipper and a set of carriers. Results show that, compared to bid prices and reputation models, our model lead lower costs in determining the winning carriers.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124072102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a formal description of mobile personalized assessment 迈向移动个性化评估的正式描述
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285805
Ahlem Harchay, L. Cheniti-Belcadhi, R. Braham
Mobile learning occurs along the advent of mobile technologies with the potential to revolutionize methods and approaches of e-Learning. It has changed the way students use for learning and assessing. This type of learning implements the concept of learning anytime and anywhere where learner operates a set of mobile technologies. In this paper, we focus on assessment in a mobile environment. We present an approach to ensure personalized assessment in mobile environment where the management of the context is an important aspect. The assessment activity is offered in a PLE (Personal Learning Environment). Subsequently, we give details of context modeling approach, and propose a formal description of the assessment context.
移动学习伴随着移动技术的出现而出现,它有可能彻底改变电子学习的方法和途径。它改变了学生学习和评估的方式。这种类型的学习实现了学习者随时随地操作一套移动技术的学习概念。在本文中,我们关注的是移动环境下的评估。我们提出了一种方法,以确保个性化的评估在移动环境中,其中上下文的管理是一个重要方面。评估活动在PLE(个人学习环境)中提供。随后,我们详细介绍了上下文建模方法,并提出了评估上下文的形式化描述。
{"title":"Towards a formal description of mobile personalized assessment","authors":"Ahlem Harchay, L. Cheniti-Belcadhi, R. Braham","doi":"10.1109/ICCITECHNOL.2012.6285805","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285805","url":null,"abstract":"Mobile learning occurs along the advent of mobile technologies with the potential to revolutionize methods and approaches of e-Learning. It has changed the way students use for learning and assessing. This type of learning implements the concept of learning anytime and anywhere where learner operates a set of mobile technologies. In this paper, we focus on assessment in a mobile environment. We present an approach to ensure personalized assessment in mobile environment where the management of the context is an important aspect. The assessment activity is offered in a PLE (Personal Learning Environment). Subsequently, we give details of context modeling approach, and propose a formal description of the assessment context.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of CPA analysis against AES design on FPGA 基于AES设计的CPA分析在FPGA上的实现
Pub Date : 2012-06-26 DOI: 10.1109/ICCITECHNOL.2012.6285774
N. Benhadjyoussef, H. Mestiri, Mohsen Machhout, R. Tourki
Physical implementations of cryptographic algorithms may let relatively side channel information. By analyzing this information leakage, the confidential data, like the cryptographic keys, can be revealed. The correlation power analysis(CPA) is a well-known attack of the cryptographic device. This paper conduces a successful CPA of the Advanced Encryption Standard AES implemented on the Xilinx FPGA with the Side-channel Attack Standard Evaluation Board (SASEBO). The experimental results show that the choice of the power model and the number of power traces can further improve the performance of CPA attack in extracting the correct key.
加密算法的物理实现可以允许相对侧信道信息。通过分析这些信息泄漏,可以揭示机密数据,如加密密钥。相关功率分析(CPA)是一种众所周知的加密设备攻击。本文利用边信道攻击标准评估板(SASEBO)在Xilinx FPGA上成功实现了高级加密标准AES的CPA。实验结果表明,功率模型和功率走线数量的选择可以进一步提高CPA攻击提取正确密钥的性能。
{"title":"Implementation of CPA analysis against AES design on FPGA","authors":"N. Benhadjyoussef, H. Mestiri, Mohsen Machhout, R. Tourki","doi":"10.1109/ICCITECHNOL.2012.6285774","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285774","url":null,"abstract":"Physical implementations of cryptographic algorithms may let relatively side channel information. By analyzing this information leakage, the confidential data, like the cryptographic keys, can be revealed. The correlation power analysis(CPA) is a well-known attack of the cryptographic device. This paper conduces a successful CPA of the Advanced Encryption Standard AES implemented on the Xilinx FPGA with the Side-channel Attack Standard Evaluation Board (SASEBO). The experimental results show that the choice of the power model and the number of power traces can further improve the performance of CPA attack in extracting the correct key.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2012 International Conference on Communications and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1